skip to main content
10.1145/2837126.2837129acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmommConference Proceedingsconference-collections
research-article

Comparing AODV and N-AODV Routing Protocols for Mobile Ad-hoc Networks

Published: 11 December 2015 Publication History

Abstract

Mobile Ad-hoc NETworks (MANETs) are wireless networks designed for communications among nomadic hosts in absence of fixed infrastructure. Different reactive protocols for MANETs, in which routes are established only when needed, provide different network topology awareness (NTA) to each host, depending on their algorithmic features. NACK-based AODV (N-AODV) is a variant of the well-known Ad-hoc On-demand Distance Vector (AODV) reactive protocol for MANETs we proposed with the aim of improving NTA of the original protocol. In this paper, a performance comparison between AODV and N-AODV is conducted in order to investigate whether N-AODV effectively improves NTA with respect to AODV, and how this improvement affects both its effectiveness and efficiency. The experiment is executed within a simulation environment. The obtained results show that a MANET adopting N-AODV exploits higher NTA than a MANET adopting AODV. Moreover, the improved awareness impacts effectiveness and efficiency of routing activities because, in the long-run, it results in a lower need to activate the route discovery process for establishing new communications sessions.

References

[1]
Abuelela, M., and Olariu, S. 2010. Taking VANET to the clouds. In: 8th International Conference on Advances in Mobile Computing and Multimedia, 6--13.
[2]
Agrawal, D.P., and Zeng, Q.A. 2003. Introduction to Wireless and Mobile Systems. Thomson Brooks/Cole.
[3]
Andel, T.R., and Yasinsac, A. 2006. On the credibility of manet simulations. Computer, 39(7), 48--54.
[4]
Bhatsangave, S.P., and Chirchi, V.R. 2012. OAODV Routing Algorithm for Improving Energy Efficiency in MANET. International Journal of Computer Applications, 51(21), 15--22.
[5]
Bianchi, A., Pizzutilo, S., and Vessio, G. 2014. Preliminary Description of NACK-based Ad-hoc On-demand Distance Vector Routing Protocol for MANETs. In: 9th International Conference on Software Engineering and Applications, 500--505.
[6]
Börger, E., and Stärk, R. 2003. Abstract State Machines: A Method for High-Level System Design and Analysis. Springer-Verlag.
[7]
Botía Blaya, J.A., Demeure, I., Gianrossi, P., Garcia Lopez, P., Martínez Navarro, J.A., Meyer, E.M., Pelliccione, P., and Taste-Cherel, F. 2009. POPEYE: providing collaborative services for ad hoc and spontaneous communities. Service Oriented Computing and Applications, 3(1), 25--45.
[8]
Conover, W.J. 1980. Practical Nonparametric Statistics. John Wiley and Sons.
[9]
Das, S.R., Castaneda, R., and Yan, J. 2000. Simulation based performance evaluation of mobile ad hoc network routing protocols, ACM/Baltzer Mobile Networks and Applications Journal, 179--189.
[10]
Demir, T. 2001. Simulation of Ad Hoc Networks with DSR Protocol. In: 16th International Symposium on Computer and Information Sciences, 617--625.
[11]
Fehnker, A., Höfner, P., Kamali, M., and Mehta, V. 2013. Topology-based Mobility Models for Wireless Networks. In: 10th International Conference on Quantitative Evaluation of Systems, 389--404.
[12]
Georgiou, S., Tsakalozos, K., and Delis, A. 2013. Exploiting Network-Topology Awareness for VM Placement in Iaas Clouds. In: 3rd International Conference on Cloud and Green Computing, 151--158.
[13]
Gupta, A.K., Sadawarti, H., and Verma, A.K. 2010. Performance analysis of AODV, DSR & TORA Routing Protocols. International Journal of Engineering and Technology, 2(2), 226--231.
[14]
Kim, C., Talipov, E., and Ahn, B. 2006. A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks. Emerging Directions in Embedded and Ubiquitous Computing, LCNS 4097, 522--531.
[15]
Kumar, P., Kumar, R., Kumar, S., and Kumar, R.D. 2010. Improved Modified Reverse AODV Protocol. International Journal of Computer Applications, 12(4), 22--26.
[16]
Kurkowski, S., Camp, T., and Colagrosso, M. 2005. MANET Simulation Studies: The Incredibles. ACM SIGMOBILE Mobile Computing and Communications Review, 9(4), 50--61.
[17]
Lien, Y.N., Jang, H.C., and Tsai, T.C. 2009. A MANET Based Emergency Communication and Information System for Catastrophic Natural Disasters. In: 29th International Conference on Distributed Computing Systems Workshops, 412--417.
[18]
Monarch Simulator. http://www.monarch.cs.cmu.edu/
[19]
Network Simulator ns-3. https://www.nsnam.org/
[20]
OLSR Web Site. http://www.olsr.org
[21]
Perkins, C.E., Belding-Royer, E., and Das S.R. 2003. Ad hoc On-Demand Distance Vector (AODV) Routing. RFC 3561, http://tools.ietf.org/html/rfc3561.
[22]
Perkins, C.E., and Bhagwat, P. 1994. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers. Computer Communication Review, 24(4), 234--244.
[23]
Perkins, C.E., Royer, E.M., Das, S.R., and Marina, M.K. 2001. Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks. IEEE Personal Communications, 8(1), 16--28.
[24]
Rostami, H., and Habibi, J. 2006. Topology Awareness of Overlay P2P Networks. Concurrency and Computation: Practice and Experience, 19(7), 999--1021.
[25]
Sedrati, M., Bilami, A., and Benmohamed, M. 2011. MAODV: AODV variant to Improve Quality of Service in MANETs. International Journal of Computer Science Issues, 8(1), 429--436.
[26]
Shiguo, W., and Ji, H. 2009. A topology-aware peer-to-peer protocol applicable to wireless network. In: International Conference on Network Infrastructure and Digital Content, 1004--1009.
[27]
Talipov, E., Jin, D., Jung, J., Ha, I., Choi, Y.J., and Kim, C. 2006. Path Hopping Based on Reverse AODV for Security. Management of Convergence Networks and Services, LNCS 4238, 574--577.
[28]
Vasudevan, S., Kurose, J., and Towsley, D. 2004. Design and analysis of a leader election algorithm for mobile ad hoc networks. In: 12th International Conference on Network Protocols, 350--360.
[29]
Wohlin, C., Runeson, P., Höst, M., Ohlsson, M.C., Regnell, B., and Wesslén, A. 2000. Experimentation in Software Engineering. Springer.
[30]
Wu, H.K., and Chuang, P.H. 2001. Dynamic QoS Allocation for Multimedia Ad Hoc Wireless Networks. Mobile Networks and Applications, 377--384.
[31]
Xiaoqi, L., Lyu, M.R., and Jiangchuan, L. 2004. A trust model based routing protocol for secure ad hoc networks. In: 2004 Aerospace Conference, vol. 2, 1286--1295.
[32]
Yang, H., Luo, H., Ye, F., Lu, S., and Zhang, L. 2004. Security in mobile ad hoc networks: challenges and solutions. Wireless Communications, 11(1), 38--47.
[33]
Zapata, M.G. 2002. Secure Ad-hoc On-Demand Distance Vector Routing. ACM SIGMOBILE Mobile Computing and Communications Review, 6(3), 106--107.

Cited By

View all
  • (2023)An Enhanced Virtual Cord Protocol Based Multi-Casting Strategy for the Effective and Efficient Management of Mobile Ad Hoc NetworksComputers10.3390/computers1201002112:1(21)Online publication date: 16-Jan-2023
  • (2020)Sustainable Scheduling of Material Handling Activities in Labor-Intensive Warehouses: A Decision and Control ModelSustainability10.3390/su1208311112:8(3111)Online publication date: 13-Apr-2020
  • (2020)Preliminary Evaluation of TinyYOLO on a New Dataset for Search-and-Rescue with Drones2020 7th International Conference on Soft Computing & Machine Intelligence (ISCMI)10.1109/ISCMI51676.2020.9311602(163-166)Online publication date: 14-Nov-2020
  • Show More Cited By

Index Terms

  1. Comparing AODV and N-AODV Routing Protocols for Mobile Ad-hoc Networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    MoMM 2015: Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia
    December 2015
    422 pages
    ISBN:9781450334938
    DOI:10.1145/2837126
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Johannes Kepler University, Linz, Austria
    • @WAS: International Organization of Information Integration and Web-based Applications and Services

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 December 2015

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. AODV variant
    2. Empirical studies
    3. MANETs

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    MoMM 2015

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 22 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)An Enhanced Virtual Cord Protocol Based Multi-Casting Strategy for the Effective and Efficient Management of Mobile Ad Hoc NetworksComputers10.3390/computers1201002112:1(21)Online publication date: 16-Jan-2023
    • (2020)Sustainable Scheduling of Material Handling Activities in Labor-Intensive Warehouses: A Decision and Control ModelSustainability10.3390/su1208311112:8(3111)Online publication date: 13-Apr-2020
    • (2020)Preliminary Evaluation of TinyYOLO on a New Dataset for Search-and-Rescue with Drones2020 7th International Conference on Soft Computing & Machine Intelligence (ISCMI)10.1109/ISCMI51676.2020.9311602(163-166)Online publication date: 14-Nov-2020
    • (2018)Building Realistic Mobility Models for Mobile Ad Hoc NetworksInformatics10.3390/informatics50200225:2(22)Online publication date: 30-Apr-2018

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media